Browse > Article
http://dx.doi.org/10.9723/jksiis.2017.22.3.049

The Effect of PC Software Piracy Attitude and Habit on Illegal Use of Smartphone App  

Kim, Joong-Han (경기대학교 경영정보학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.22, no.3, 2017 , pp. 49-61 More about this Journal
Abstract
Due to Proliferation of Mobile Devices, the Global Mobile Application (App) Market is Set to Continue its Impressive Growth Trajectory. However, like other Digital Contents, Prevalent Piracy of Smartphone Apps has Become One of the Major Obstacles to the Growth of the Newborn App Industry. The Objective of this Study is to Examine and Better Understand the Effects of Factors Which has been Known to Influence PC Software Piracy. A Research Model Explaining the Impact of Various Factors to Smartphone App Piracy Attitude and Intention is Constructed Based on Theories of Ethical Behavior. A Survey of College Students was Conducted to Test the Research Model. Findings Show that PC Software Piracy Habit and Attitude have Significant Effects on Smartphone Piracy Attitude and Intention. Beliefs Concerning Judicial and Performance Risks Due to Piracy have Little Effects on Smartphone App Piracy Attitude.
Keywords
Software Piracy; App Piracy; Intention; Attitude; Habit; Risks;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 StatCounter, "Mobile and Tablet Internet u Sage Exceeds Desktop for First Time Worl Dwide," http://gs.statcounter.com/press/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide. 2016.
2 Newzoo, "Global Mobile Market Report: App Market to Gross $44.8BN This Year," https://newzoo.com/insights/articles/globalmobile-market-report-app-market-to-gross-44-8bn-this-year. 2016.
3 AppFigures, "App Stores Start to Mature-2016 Year in Review," http://blog.appfigures.com/app-stores-start-to-mature-2016-year-in-review. 2017.
4 Korea Copyright Commission, "Research on Status of Copyright Violations from Mobile Equipment and Setting Up Countermeasures," 2011.
5 Business Software Alliance, "2016 BSA Global Software Survey," 2016.
6 Korea Culture and Tourism Institute, "A Study on the Effect on Economical Effect of Decrease in Contents Piracy," 2011.
7 Kubesch, A.S., and Wicker, S., “Digital Rights Management: The Cost to Consumers,” Proceedings of the IEEE, Vol. 103, No. 5, pp. 726-733, 2015.   DOI
8 Kim, E., S. Kim, and Choi, J., "Detecting Illegally-Copied Apps on Android Devices," in IT Convergence and Security (ICITCS), 2013 International Conference on IT Convergence and Security, pp. 1-4, 2013.
9 Chae, D.K., Kim, S.W., Cho, S.J. and Kim, Y., "Effective and Efficient Detection of Software Theft via Dynamic API Authority Vectors," Journal of Systems and Software, Vol. 110, pp. 1-9, 2015.   DOI
10 Gopal, R.D., and Sanders, G.L., “International Software Piracy: Analysis of Key Issues and Impacts,” Information Systems Research, Vol. 9, No. 4, pp. 380-397, 1998.   DOI
11 Depken, C.A., and Simmons, L.C., “Social Construct and the Propensity for Software Piracy,” Applied Economics Letters, Vol. 11, No. 2, pp. 97-100, 2004.   DOI
12 Ki, E.J., Chang, B.H., and Khang, H., “Exploring Influential Factors on Music Piracy Across Countries,” Journal of Communication, Vol. 56, No. 2, pp. 406-426, 2006.   DOI
13 Moores, T. T., “An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates,” Journal of Business Ethics, Vol. 81, No. 1, pp. 39-51, Jul. 2008.   DOI
14 Leonard, L.N.K., and Cronan, T.P., “Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context: A study to Explain Influences,” Journal of the Association for Information Systems, Vol. 1, No. 12, pp. 1-31, 2001.
15 Gottfredson, M., and Hirschi, T., A General Theory of Crime. Stanford University Press, 1990.
16 Gopal, R.D., and Sanders, G.L., “Global Software Piracy: You Can’t Get Blood Out of a Turnip,” Communications of the ACM, Vol. 43, No. 9, pp. 82-89, 2000.   DOI
17 Randall, D.M., and Gibson, A.M., “Ethical Decision Making in the Medical Profession: An Application of the Theory of Planned Behavior,” Journal of Business Ethics, Vol. 10, No. 2, pp. 111-122, 1991.   DOI
18 Vitell, S.J., Singh, J.J. and Paolillo, J.G.P., “Consumers’ Ethical Beliefs: The Roles of Money, Religiosity and Attitude toward Business,” Journal of Business Ethics, Vol. 73, No. 4, pp. 369-379, Dec. 2007.   DOI
19 Higgins, G.E., Wolfe, S.E. and Marcum, C.D., “Digital Piracy: An Examination of Three Measurements of Self-Control,” Deviant Behavior, Vol. 29, No. 5, pp. 440-460, Jun. 2008.   DOI
20 Marcum, Catherine, D., Higgins, G.E., Wolfe, S.E. and Ricketts, M.L., “Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy,” Western Criminology Review, Vol. 12, No. 3, pp. 60-74, 2011.
21 Lee, S.Y., and Lee, Y.H., “Effect of Self-Control and Rational Choice on Online Digital Piracy,” Journal of Social Science, Vol. 23, No. 3, pp. 53-78, 2016.
22 Moon, B., McCluskey, J.D. and McCluskey, C.P., “A General Theory of Crime and Computer Crime: An Empirical Test,” Journal of Criminal Justice, Vol. 38, No. 4, pp. 767-772, Jul. 2010.   DOI
23 Hinduja, S., “A critical Examination of the Digital Music Phenomenon,” Critical Criminology, Vol. 14, No. 4, pp. 387-409, 2006.   DOI
24 Piquero, A.R., and Bouffard, J.A., “Something Old, Something New: A Preliminary Investigation of Hirschi’s Redefined Self-Control,” Justice Quarterly, Vol. 24, No. 1, pp. 1-27, 2007.   DOI
25 Hunt, S.D., and Vitell, S., “A General Theory of Marketing Ethics,” Journal of Macromarketing, Vol. 6, No. 1, pp. 5-16, 1986.   DOI
26 Williams, K.R., and Hawkins, R., “Perceptual Research on General Deterrence: A Critical Review,” Law and Society Review, Vol. 20, No. 4, pp. 545-572, 1986.   DOI
27 Chiu, R. K., “Ethical Judgment and Whistleblowing Intention: Examining the Moderating Role of Locus of Control,” Journal of Business Ethics, Vol. 43, No. 1, pp. 65-74, 2003.   DOI
28 Peace, A.G., Galletta, D.F. and Thong, J.Y.L., “Software Piracy in the Workplace: A Model and Empirical Test,” Journal of Management Information Systems, Vol. 20, No. 1, pp. 153-177, 2003.   DOI
29 Thong, J.Y.L., and Yap, C.S., “Testing an Ethical Decision-Making Theory: The Case of Softlifting,” Journal of Management Information Systems, Vol. 15, No. 1, pp. 213-237, 1998.   DOI
30 Ajzen, I., and Fishbein, M., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley, 1975.
31 Ajzen I., “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp. 179-211, Dec. 1991.   DOI
32 D'Astous, A., Colbert, F., and Montpetit, D., “Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour,” Journal of Consumer Policy, Vol. 28, No. 3, pp. 289-310, 2005.   DOI
33 Lin, T., Hsu, M.H., Kuo, F., and Sun, P., "An Intention Model-based Study of Software Piracy," in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol. 30, No. c, pp. 1-8, 1999.
34 Cronan, T.P., and Al-Rafee, S., “Factors that Influence the Intention to Pirate Software and Media,” Journal of Business Ethics, Vol. 78, No. 4, pp. 527-545, Mar. 2008.   DOI
35 Wood, W., Labrecque, J.S., Lin, P.Y., and Runger, D., "Habits in Dual Process Models", In Dual Process Theories of the Social Mind, Guilford Press New York: NY, pp. 371-385, 2014.
36 Yoon, C., “Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model,” Journal of Business Ethics, Vol. 100, No. 3, pp. 405-417, Nov. 2011.   DOI
37 Triandis, H.C., "Values, Attitudes, and Interpersonal Behavior," in Nebraska symposium on motivation, pp. 195-259, 1979.
38 Limayem, M., Khalifa, M., and Chin, W.W., “Factors Motivating Software Piracy: A Longitudinal Study,” IEEE Transactions on Engineering Management, Vol. 51, No. 4, pp. 414-425, Nov. 2004.   DOI
39 Nandedkar, A., and Midha, V., “It Won’t Happen to Me: An Assessment of Optimism Bias in Music Piracy,” Computers in Human Behavior, Vol. 28, No. 1, pp. 41-48, Jan. 2012.   DOI
40 Lysonski, S., and Durvasula, S., “Digital Piracy of MP3s: Consumer and Ethical Predispositions,” Journal of Consumer Marketing, Vol. 25, No. 3, pp. 167-178, 2008.   DOI
41 Hennig-Thurau, T., Henning, V., and Sattler, H., "Consumer File Sharing of Motion Pictures", Journal of Marketing, Vol. 71, No. 4, pp. 1-18, 2007.   DOI
42 Nill, A., Schibrowsky, J., and Peltier, J., "Factors That Influence Software Piracy: A View from Germany", Communications of the ACM, Vol. 53, No. 6, pp. 131-134, 2010.   DOI
43 Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling", Modern Methods for Business Research, Vol. 295, No. 2, pp. 295-336, 1998.
44 Kim, J.H., "A Study on the Predictors of Intention to Pirate Software", Journal of the Korea Society of IT Services, Vol. 12, No. 2, pp. 131-152, 2013.   DOI
45 Bagozzi, R.P., "Attitudes, Intentions, and Behavior: A Test of Some Key Hypotheses.", Journal of Personality and Social Psychology, Vol. 41, No. 4, pp. 607-627, 1981.   DOI
46 JHair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E., Multivariate data analysis, 7th ed. New Jersey: Prentice Hall, 2009.
47 Higgins, G.E., Wilson, A.L., and Fell, B.D., "An Application of Deterrence Theory to Software Piracy", Journal of Criminal Justice and Popular Culture, Vol. 12, No. 3, pp. 166-184, 2005.